A key WordPress characteristic has been kidnapped to show malicious code, spam images




  • Succuri’s researchers found malicious code hidden in the Mu-Plugins directory
  • Malware redirected visitors, served spam and could even drop malware
  • The sites were committed through vulnerable accessories, deficient administration passwords and more

Researchers have affirmed that a special directory in WordPress is abusing malicious code, warning that the code allows the threat actors to remain persistent on vulnerable websites, while executing an arbitrary code, redirecting people to malicious websites and showing spam and unwanted ads.

Succuri’s researchers discovered that threat actors hid the malicious code in “Mu-Plugins” (abbreviation for mandatory use accessories), a directory that stores accessories that are automatically activated and cannot be deactivated through the administration panel.

Leave a Comment

Your email address will not be published. Required fields are marked *